Reader small image

You're reading from  Microsoft Operations Management Suite Cookbook

Product typeBook
Published inApr 2018
PublisherPackt
ISBN-139781786469090
Edition1st Edition
Right arrow
Author (1)
Chiyo Odika
Chiyo Odika
author image
Chiyo Odika

Chiyo Odika is a author, consultant, strategist and thought leader who is passionate about data-driven management and architecture. Chiyo excels at helping clients think strategically about how to use technology to optimize the service delivery to the business, and to create fundamental business change and value. His current technology focus is cloud computing. He enjoys talking about hybrid cloud flexibility, exploring business technology trends, optimizing cloud infrastructures, and leading solution delivery teams. He has extensive experience in leading full lifecycle technology implementations of cutting-edge business solutions for a wide range of global clients and has championed initiatives from ideation to execution and delivery. His current technology focus is the Microsoft Cloud. He enjoys talking about hybrid cloud flexibility, and optimizing cloud infrastructures with Microsoft Azure, Windows Server, and Microsoft System Center, and about IT Service Management and process optimization.
Read more about Chiyo Odika

Right arrow

Working with Security and Compliance in OMS

In this chapter, we will take a comprehensive look at the Security and Compliance solution offering in OMS, and explore the OMS Security and Audit solution, related solutions, and security-related capabilities in OMS. We will cover the following topics:

  • Using the Security and Audit solution
  • Understanding Security and Audit data
  • Using the Antimalware Assessment solution
  • Using Baseline Assessment
  • Using the Update Management solution

Introduction

Growing and ever-changing security threats are some of the toughest challenges that organizations face today. As threat actors and defenders adapt to the exponential growth of business data, and advances in technology and security-related capabilities, the need for organizations to implement a coherent cybersecurity strategy is greater than ever. As IT security and operations team grapple with the challenges of managing and securing highly complex, cross-platform, and hybrid cloud systems that are increasingly subject to a rising number of sophisticated cyber attacks, organizations are coming to terms with the reality that a security strategy that revolves around traditional, perimeter-based defenses alone is no longer a sound strategy. This outdated strategy should be supplanted by cybersecurity that is cloud-enabled and based on, among other things, real-time analysis...

Using the Security and Audit solution

The OMS Security and Audit solution is one of the key capabilities of the Security and Compliance offering in OMS. The Security and Audit solution provides a comprehensive view into the IT security posture of your organization by enabling you to monitor your environment for potential threats and vulnerabilities. The Security and Audit solution uses built-in search queries and intuitive visualizations to highlight security issues that should be addressed. With threat intelligence, malware detection, and other security capabilities, the solution provides you with increased visibility to prevent, detect, and respond to various security threats. In this section, we will explore the Security and Audit solution and the various solution features and capabilities.

...

Understanding Security and Audit data

Recall that, as part of the Security and Compliance solution offering in OMS, the Security and Audit solution is designed to provide you with a unified view of all security-related issues detected in your environment. The solution therefore weaves together data from disparate but related sources and solutions in your workspace, and leverages information from the intelligent security graph to unlock insights and enable you to prevent, detect, and remediate security threats in your environment. You can explore Security and Audit data by using the built-in solution visualizations, which enable you to interact with the underlying queries and resulting security records. You can also perform query operations using the query language to query security-related data in your OMS workspace.

...

Using the Antimalware Assessment solution

The Antimalware Assessment solution in Log Analytics enables you to monitor the status of Antimalware protection in your environment. The solution detects whether supported antimalware solutions are installed on your machines, and whether the solutions are operational. You can install this solution from the Solutions Gallery in your OMS workspace or add it to your Log Analytics through the Azure marketplace in the Azure Portal.

How to do it...

If you haven't completed the How to do it section in the Using the Security and Audit solution recipe, you can follow these steps:

Adding the...

Using baseline assessment

Security baseline assessment is one of the assessment capabilities of OMS Security. The Security and Audit solution uses this capability to help you assess how compliant your machines are with an established configuration for highly secure server deployments.

This assessment is part of the Security and Audit solution. You will need to install the Security and Audit solution to access this capability in your OMS workspace. Note that baseline assessment supports both Windows and Linux machines.

How to do it...

Perform the following steps to use security baseline assessment:

Adding the Security and Audit...

Using the Update Management solution

The Update Management solution in OMS is part of the Automation & Control offering. Update Management identifies missing system updates and orchestrates the installation of these updates across Windows and Linux servers, both in your data center and in any public cloud. The Update Management solution supports both update assessments and, using automation, update deployments on supported operating systems.

Getting ready

To use the Update Management solution, ensure you do the following:

  • Create and configure an Azure Automation account.
  • Ensure that machines are running supported operating systems. See the Supported operating systems subsection.
  • Target machines with Windows agents should...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Microsoft Operations Management Suite Cookbook
Published in: Apr 2018Publisher: PacktISBN-13: 9781786469090
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Chiyo Odika

Chiyo Odika is a author, consultant, strategist and thought leader who is passionate about data-driven management and architecture. Chiyo excels at helping clients think strategically about how to use technology to optimize the service delivery to the business, and to create fundamental business change and value. His current technology focus is cloud computing. He enjoys talking about hybrid cloud flexibility, exploring business technology trends, optimizing cloud infrastructures, and leading solution delivery teams. He has extensive experience in leading full lifecycle technology implementations of cutting-edge business solutions for a wide range of global clients and has championed initiatives from ideation to execution and delivery. His current technology focus is the Microsoft Cloud. He enjoys talking about hybrid cloud flexibility, and optimizing cloud infrastructures with Microsoft Azure, Windows Server, and Microsoft System Center, and about IT Service Management and process optimization.
Read more about Chiyo Odika